2013 Application Security Survey - Draft

Page 1. Introduction

Thank you for taking the time to participate in the Global CISO Application Security Survey, created by the Open Web Application Security Project (OWASP). There is no question that application security has become a serious concern in almost every industry. We created this survey to provide you with an opportunity to compare your organization with others on important application security issues and gain insights for making key decisions. The GASS questionnaire consists of 26 questions concerning application security. They relate to investments and challenges, threats and risks, tools and technology, and governance and control within your organization. Your participation in responding to this questionnaire should require less than 20 minutes of your time. At the conclusion of the survey, the combined results will be publicly available on the owasp.org website. This survey can be conducted by keeping your profile completely anonymous. In case you are willing to provide your contact information, we will make sure that personal identifiable individual information won't be either disclosed or published responses in the survey report.

Page 2. Instructions

All responses in this survey are optional, but for the completeness of the report, please try to respond to all questions in the questionnaire. Please feel free to add additional information and views from colleagues in your organization.

Deadline for submission of the completed survey is 31 January, 2013.

Thank you for your participation!

Page 3. Threats and Risks - Information Security

1. Given the current threat landscape and the economic environment, do you perceive a change in the threats facing your organization? (choose all that apply) [1-3, increase, same, decrease, don't know:

2. Targeting (Infrastructure vs. Applications): In the your current threat landscape, what are the main areas of risk for your organization in % out of 100% in total:

A.Infrastructure %

B.Application %

C.Other %

3. Compared to 12 months ago, do you see a change in these areas: [1-3, increase, same, decrease, don't know):

A.Infrastructure

B.Application

C.Other

Page 4. Threats and Risks (continued) - Application Security

4. From the following list, which are the top five sources of application security risk within your organization? (Please mark your top area of risk with a "1," your second with a "2," your third with a "3," your fourth with a "4," and your fifth with a "5"):

A.Insecure source code development

B.Lack of awareness of application security issues within the organization

5. Regarding your top five areas of application security risk (above), which of the following statements best describes your organization's planned investment in these areas in the coming 12 months? (choose one):

7. Do you see new threats to web applications negatively impacting your organisation?

A.No

B.Yes (If yes, how?)

(Text)

8. Did your company experience a data breach because of a web application security incident in the last 12 months?

A.No

B.Yes (If yes, what was the root cause of the incident, e.g. in terms of type of vulnerability or control gaps)

(text)

9. Is your organization spending more on application security in response to a breach or security incident related to a web application? (choose one)

A.No

B.Yes

Page 6. Investments and Challenges (continued)

10. Please indicate your top five application security priorities for the coming 12 months from the following list. (Specify your top 5 priorities, marking your top priority with a "1," your second priority with a "2," etc.)

Page 7. Relevance of OWASP

11. What is the level of significance of OWASP guidance, books and white papers within your organization? (Scale of 1-5, where 1 is the "least significant" and 5 is the "most significant")

A.Awareness material (e.g. Top-10)

B.Application development policy

C.Code development guidelines

D.Reference to leading practice

E.Testing methodologies

F.Staff attending local OWASP chapter meetings for information

G.Staff attending OWASP AppSec conferences

Page 8. Relevance of OWASP (continued)

12. Which of the following OWASP projects has your organization found useful? (choose all that apply) [1-3, very useful, somewhat useful, not useful for us, don't know it]

A.AntiSamy

B.Application Security FAQ

C.Application Security Verification Standard (ASVS)

D.AppSensor

E.Cheatsheets

F.CISO Guide

G.Code Review Guide

H.Development Guide

I.ESAPI (Enterprise Security API)

L.Http Post Tool

M.JBroFuzz

N.Legal Project

O.LiveCD/WTE

P.Mod_Security Core Ruleset

Q.OpenSAMM

R.O2

S.OWASP Top-10

T.RFP Criteria

U.Ruby on Rails Security Guide

V.Secure Coding Practices Quick Reference

Z.Software Assurance Maturity Methodology (openSAMM)

K.Testing Guide

X.Webgoat

W.WebScarab

Y.Zed Attack Proxy (ZAP)

J.None. I am not familiar with any OWASP Projects.

Other (please explain)

Page 9. Challenges for Application Security

13. What is the level of challenge related to effectively delivering your organization's application security initiatives for each of the following?
(Scale of 1-5, where 1 is "not a challenge" and 5 is "significant challenge"), Not a Challenge,Significant Challenge

Page 10. Tools and Technology

14. Does your organization use any specific technology tools to support the application security management process?

A.Yes

B.No

15. Which of the following technology tools does your organization use or are planned to be implemented by your organization to provide application security capability? (choose all that apply) Currently in use, Planned within 12-18 months,No plans to implement

A.Web application firewalls

B.Source code analyzers

C.Runtime analyzers

D.Application Vulnerability Scanners

E.Desktop Web Application Vulnerability Scanners

F.Manual Code Review (e.g., 3rd party experts)

G.Other

(please specify other below):

Page 11. Tools and Technology (continued)

16. As part of your information security management program, do you...
Currently in use,Planned within 12-18 months,No plans to implement

A.use a SDLC (Secure development lifecycle)

B.conduct security training

C.document and enforce security guidelines

D.specify security requirements

E.use risk management

F.use threat modelling

G.specify security requirements

H.secure architecture

I.use tested common security modules/frameworks

L.do code reviews

M.testing with test cases for security

N.harden the deployment environment

O.have a vulnerability management process

Page 12. Governance and Control

17. Does your organization have a documented application security strategy?

A.Yes

B.No

18. For how long does this application security strategy plan ahead?

A 3 months

B 6 months

C 1 year,

D 2 years,

E 3 years,

F 5 years+ (circle one)

19. Your application security strategy: (choose all that apply)

A....has been reviewed and updated within the past 12 months

B...is aligned with, or integrated into, the organization's business strategy

C...is aligned with, or integrated into, the organization's IT strategy

D...outlines our key security activities for the next 12 months

Page 13. Governance and Control (continued)

20. Which of the following statements best describes your organization's application security strategy in regards to the risks associated with the increased use of social networking, personal devices, or cloud computing? (choose one)

Page 17: Wishes and suggestions

And last but not least, all your feedback is very important to us and the community is continuously striving to improve.
If you could wish freely, what kind of OWASP project, guidance or tool would you like to see in the future that could really improve your daily life and operation around web and application security?

Page 18. This Completes the Survey

This completes the survey. We would appreciate if could also provide a few personal and professional details. This will provide us valuable information about your industry and position helping us to analyze the survey data by industry and type of organization. It will also provide you an opportunity to leave your contact information if you would like us to follow up with you regarding the survey results. Once again, all responses are optional and especially your contact data will be treated as confidential and used only for the evaluation of this survey

A.Yes, I am willing to take a couple more minutes to assist with survey benchmarking.
B.No, I prefer to exit the survey at this point.

Page 19. Optional: Participant Information

(*)We reccomend do not type your first name, last name and email in the survey herein but send it over to the survey's point of contact by email since this information is considered personal identifiable information and we would like to be treated as strictly confidential.

(*)Email address: (optional, will be treated strictly confidential and only be used to send you a link to the final survey report after it's completion)

Title of delegate completing survey:

Chief Operating Officer

Chief Information Officer

Chief Application Security Officer

Chief Security Officer

Chief Privacy Officer

Chief Compliance Officer

Chief Technology Officer

Chief Risk Officer

Business Unit Executive/Vice President

Information Technology Executive

Application Security Executive

Network/System Administrator

Internal Audit Director/Manager

Other: (please specify)

To further refine our survey data by a qualitative component, we would also like to ask whether you would potentially be open for a 30 minute confidential phone interview to further refine certain areas and learn more about your views for future surveys and application security projects that matter to you. All data will be treated as confidential and only be used in anonymous and aggregated form.

If you are ok with us contacting you for a 30-minute phone interview, please provide your email address (*) (again):

Page 20. Organization Information

Total number of employees: (choose one)
Less than 1,000
1,000 to 9,999
10,000 to 49,999
50,000 to 100,000
More than 100,000

Annual revenue (in USD): (choose one)
Less than $100 million
$100 million to $249 million
$250 million to $499 million
$500 million to $999 million
$1 billion to $9 billion
$10 billion to $24 billion
More than $24 billion
Not applicable